US20020061105A1 - Method and apparatus to control copying from a drive device to a data reproducing device - Google Patents
Method and apparatus to control copying from a drive device to a data reproducing device Download PDFInfo
- Publication number
- US20020061105A1 US20020061105A1 US10/051,142 US5114202A US2002061105A1 US 20020061105 A1 US20020061105 A1 US 20020061105A1 US 5114202 A US5114202 A US 5114202A US 2002061105 A1 US2002061105 A1 US 2002061105A1
- Authority
- US
- United States
- Prior art keywords
- key
- data
- reproducing
- drive device
- reproducing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00536—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein encrypted content data is subjected to a further, iterated encryption, e.g. interwoven encryption
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00557—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein further management data is encrypted, e.g. sector headers, TOC or the lead-in or lead-out areas
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00681—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access
- G11B20/00688—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access said measures preventing that a usable copy of recorded data can be made on another medium
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
- G11B20/00768—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags wherein copy control information is used, e.g. for indicating whether a content may be copied freely, no more, once, or never, by setting CGMS, SCMS, or CCI flags
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91321—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy protection control signal, e.g. a record inhibit signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91328—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
A data copy control method is applied to a computer system that has a reproducing device which receives reproducing data read out by a drive device. A shared key is produced in the drive device and the reproducing device. The reproducing data in the drive device is enciphered using copy control data read out by the drive device and the shared key. The enciphered reproducing data and the copy control data are transferred to the reproducing device. The enciphered reproducing data is deciphered using the copy control data received by the drive device and the shared key.
Description
- This application is a continuation of U.S. Application No. 08/817,903, filed Mar. 31, 1997, which, in turn, is the national phase of International Application PCT/JP96/03608, filed Dec. 11, 1996, which, in turn, claims priority from Japanese application No. 08-000985, filed Jan. 8, 1996, the contents of each of which are incorporated herein by reference.
- 1. Field of the Invention
- This invention relates to a copy control method and copy control apparatus applied to a data processing system having the function of reproducing and outputting data, such as movies or music, compressed by, for example, the
MPEG 2 standard. Such data is referred to herein as “provided data.” - The present invention relates to a copy control method and copy control apparatus which, when recording and reproducing the data recorded on a large capacity recording medium, such as a CD-ROM or a DVD (digital video disk), as copied data, enables the reproduction of the copied data to be controlled by the specific control information recorded on the medium.
- The present invention relates to a method of and apparatus for controlling the copying of data supplied by communicating through a computer system having the function of receiving provided data, such as movies or music, via communication means and reproducing and outputting the provided data.
- 2. Description of Related Art
- For systems that reproduce and output data supplied from the film industry or the music industry, compressed by the
MPEG 2 standard, copy protection techniques are required to prevent unauthorized copying. - When providing data by computer systems that reproduce and output the data, it is essential to establish highly reliable copy protection techniques capable of preventing unauthorized copying. These copy protection techniques must not be capable of being broken by computer processing.
- With conventional copy protection techniques of this type, copy protection data is also recorded on a recording medium, such as a CD-ROM on which the provided data has been recorded, and the copy protection data, together with the provided data, is read and transferred to a copy protection unit, which performs a copy protection process on the provided data, thereby preventing unauthorized copying.
- In conventional copy protection techniques, however, the copy protection process is not carried out until the provided data recorded on the disk has been transferred to the copy protection unit. This permits intentional unauthorized copying of the provided data in a system configurations having a computer acting as a transfer unit between the disk reading unit and reproducing unit.
- As described above, with a conventional system where the provided data is exchanged via a computer, a highly reliable copy protection technique capable of preventing unauthorized copying has not been established. When a computer system is used that enables part of the provided data to be selectively read into the computer and used this leads to the problem of permitting the unauthorized copying of all of the provided data.
- It is, an object of the present invention to overcome the disadvantages in the prior art by providing a highly reliable copy control method and copy control apparatus that reliably prevents unauthorized copying even when a computer intervenes in the exchange of data supplied from a large capacity recording medium, or the like (the “medium”).
- Furthermore, it is an object of the present invention to provide a highly reliable copy control method and copy control apparatus that enable the medium to control copying ability arbitrarily on a provided data basis without showing key data used in enciphering and deciphering to a computer that intervenes in the exchange of data supplied from a medium. Such a copy control method and apparatus will always enable the use of the provided data through authorized copying.
- In an embodiment of the present invention, when a device capable of copying, such as a computer, intervenes in the exchange of data supplied from a medium, the data read from the medium is enciphered by a specific key on the computer. It is then possible to control a decision as to whether to reproduce the copied data arbitrarily.
- Furthermore, according to an embodiment of the present invention, a highly reliable copy control method and copy control apparatus enables a side having the medium to control reproduction of the copied data arbitrarily on a provided data basis without showing the key data used in enciphering and deciphering to a computer that intervenes in the exchange of data supplied from a medium. The copying control method and apparatus always enable the use of the provided data through authorized copying.
- In an embodiment of the present invention, the action of recording the data supplied from the medium in a storage device, and reading and reproducing the recorded data is referred to as reproduction of the copied data.
- Specifically, an embodiment of the present invention comprises, in a system provided with a drive for reading the data recorded on a large capacity recording medium, a data reproducing device for receiving the data read by the drive via data transfer means, reproducing the received data, and outputting the reproduced data, and means for recording the data transferred from the data transfer means as copied data. The data sent from the drive to the data transfer means is enciphered using the key data generated by the data reproducing device. Only the data reproducing device has the key data used in enciphering and is allowed to reproduce the copied data (i.e., is allowed to make a first generation copy).
- Furthermore, an embodiment of the present invention comprises, in the above system, the drive and the data reproducing device each generating mutually related key data separately on the basis of random numbers, the drive enciphering the data to be outputted to the data transfer means using its self-generated key data, and the data reproducing device deciphering the data received from the data transfer means using its self-generated secondary key data, thereby permitting only the data reproducing device having the related key data to perform reproduction without giving to the data transfer means the key data used in enciphering and deciphering and disabling the reproduction of the copied data.
- Furthermore, an embodiment of the present invention comprises, in the system, the drive and the data reproducing device recognizing the copy permission level on the basis of the specific control data recorded on the large capacity recording medium. When the recognized level is the level permitting the copied data to be reproduced, the data read by the drive is given to the data transfer means without enciphering. When the recognized level is the level permitting only a specific data reproducing device to reproduce the copied data, the data read by the drive is enciphered using the key data generated by the data reproducing device that is to perform reproduction and the enciphered data is given to the data transfer. When the recognized level is the level inhibiting the reproduction of the copied data, the drive and the data reproducing device temporarily generate mutually related key data using random numbers, thereby enabling only the data reproducing device having the related key data to reproduce the data read by the drive and disabling all of the data reproducing devices including one having the related key data from reproducing the copied data.
- Furthermore, an embodiment of the present invention comprises, in a system including a data providing device for providing data via communication means, a data reproducing device for receiving data from the data providing device via the communication means, reproducing the received data, and outputting the reproduced data, and means for recording the data provided to the data reproducing device via the communication means as copied data. The data providing device receives key data from the data reproducing device and on the basis of the key data, enciphers the data to be given to the data reproducing device, thereby enabling only the data reproducing device having the key data used in enciphering to reproduce the copied data.
- Furthermore, an embodiment of the present invention comprises, in the above system, the data providing device and the data reproducing device generating mutually related key data separately using random data, the data providing device enciphering the data to be sent to the data reproducing device using its self-generated enciphering key data, and the data reproducing device deciphering the data received from the data providing device using its self-generated deciphering key data, thereby enabling the data received via the communication means to be reproduced and disabling the copied data from being reproduced.
- Furthermore, an embodiment of the present invention comprises, in the system, the data providing device sending copy permission data specifying the permission level of copied data to the data reproducing device, and the data reproducing device recognizing the permission level of the copy of the provided data on the basis of the copy permission data received from the data providing device. When the recognized level is the permission level enabling the copied data to be reproduced, the data to be provided is given without enciphering to the data reproducing device via the communication means. When the recognized level is the permission level enabling only a specific data reproducing device to reproduce the copied data, the key data is received from the data reproducing device and the provided data enciphered on the basis of the key data is given to the data reproducing device via the communication means, and when the recognized level is the permission level inhibiting the copied data from being reproduced, the data providing device and the data reproducing device temporarily generate mutually related key data using random data, and the provided data enciphered on the basis of the key data is given to the data reproducing device via the communication means.
- With the aforementioned copy control mechanisms, even in a system where a device capable of copying, such as a computer, intervenes in the exchange of the data supplied by a large capacity recording medium, a communication medium, or the like, it is possible to construct a highly reliable system which enables the medium side to control the reproduction of the copied data on the provided data basis without showing the key data used in enciphering and deciphering to an intervening computer, and which always enables the provided data to be used in the form of an authorized copy.
- FIG. 1 is a block diagram of a basic system configuration according to a first embodiment of the present invention;
- FIG. 2 is a block diagram of a system configuration according to a second embodiment of the present invention;
- FIG. 3 is a flowchart for the processing sequence in the second embodiment of the present invention;
- FIG. 4 is a flowchart for the processing sequence in the second embodiment of the present invention;
- FIG. 5 is a flowchart for the processing sequence in the second embodiment of the present invention;
- FIG. 6 is a flowchart for the processing sequence in the second embodiment of the present invention;
- FIG. 7 shows a data format to help explain in the copy permission data (CGMS) in the media file management data block recorded on the
data recording medium 20 in the embodiment of the present invention; - FIG. 8 is a conceptual diagram to help explain the way that the drive unit, CPU, and reproducing unit exchange various types of data for encoding and decoding data transferred between them in a third embodiment of the present invention;
- FIG. 9 is a system block diagram in the third embodiment of the present invention; and
- FIG. 10 is a flowchart showing the way that the drive unit, CPU, and reproducing unit exchange various types of data for encoding and decoding between them in the third embodiment of the present invention.
- Hereinafter, referring to the accompanying drawings, embodiments of the present invention will be explained.
- FIG. 1 is a block diagram showing the basic system configuration according to a first embodiment of the present invention. The figure illustrates an embodiment that permits a first-generation copy in such a manner that, with the provided data, such as movies or music, recorded on a large capacity storage medium (DVD2) being the object of copy protection, only a data reproducing unit (MPEG board 6) having the enciphered key data is allowed to copy and reproduce the data read by a drive (DVD drive 4) by enciphering the provided data supplied from the drive (DVD drive 4) to data transfer means (PC1), using the key data generated in the data reproducing unit (MPEG board 6).
- In FIG. 1, a computer (PC)1 transfers or supplies the provided data read by the drive to the data reproducing unit. The
computer 1 selectively takes in the copy-permitted provided data read by the drive, stores it in anexternal storage unit 3, such as an HDD or a DVD-RAM, and enables processes, including editing and correction. - A
DVD disk 2 stores provided data, such as movies or music, that is the object of copy protection. On theDVD 2, not only the provided data is compressed and recorded by, for example, theMPEG 2 scheme, but also the copy permission data (CGMS) as shown in FIG. 7 is recorded in part of the media file management data block so as to correspond to the provided data. - A
drive unit 4 reads the data from theDVD 2. Thedrive unit 4 is referred to as the DVD drive. TheDVD drive 4 has the function of receiving the key data generated in the data reproducing unit and enciphering the provided data read by theDVD 2 using the key data. A concrete configuration of the function is shown in FIG. 2. - A
data reproducing unit 6 receives the provided data read by theDVD drive 4 via the computer unit (PC) 1 and performs reproducing and outputting processes. Thedata reproducing unit 6 may be referred to as an MPEG board. TheMPEG board 6 is provided with aMPEG 2 decoder and obtains the reproduced output data by decoding the provided data compressed by theMPEG 2 scheme received via the computer unit (PC) 1. Moreover, theMPEG board 6 has the function of not only creating key data and sending the key data to theDVD drive 4 but also deciphering the provided data using the key data. A concrete configuration of the function is shown in FIG. 2. - In the configuration of FIG. 1, the
MPEG board 6 not only issues the key data generated at theboard 6 to theDVD drive 4, but also holds the key data as a deciphering key. - The
DVD drive 4 generates an enciphering key using the key data and enciphers the provided data read by theDVD 2, and thereafter sends the enciphered data to theMPEG board 6 via the computer unit (PC) 1. - The
MPEG board 6 receives the provided data enciphered by theDVD drive 4 via the computer unit (PC) 1 and decodes the enciphered data using the deciphering key. - Providing such a copy control mechanism enables only the
MPEG board 6 having the key data used in enciphering to record and reproduce the data read by theDVD drive 4 as copied data. - Specifically, when the
DVD drive 4 performs one type of enciphering on a type of (or a piece of) provided data, even if a plurality of data reproducing units are connected via a data transfer unit, those, except for the data reproducing unit having the key data used in enciphering, cannot reproduce the copied data. - In the concrete configuration, the key data sent from the
MPEG board 6 to theDVD drive 4 is enciphered. In addition, in the concrete configuration, exclusive control of copying in the embodiment is selectively effected according to the copy permission data (CGMS). As a concrete example, in FIG. 7, when bO and bl in the CGMS are “01,” the aforementioned exclusive control of copying is possible. - FIG. 2 is a block diagram showing a system configuration in a second embodiment of the present invention. The second embodiment realizes a system having the function of, according to the copy permission data (CGMS) recorded on a large capacity recording medium, selectively switching between the copy permission level of copy free, at which all of the data reproducing units are allowed to reproduce the copied data obtained by once recording the provided data read by the drive, the level at which only a specific data reproducing unit is allowed to reproduce the copied data, and the level at which none of the data reproducing units are allowed to reproduce the copied data.
- In FIG. 2,
reference symbols 10 and 10A indicate the component parts corresponding to the computer unit (PC) 1 shown in FIG. 1. ACPU 10 of a computer body supervises control of the entire system. 10A indicates a system bus for the entire system. Under the control of theCPU 10, the copy control processing as shown in FIGS. 3 to 6 is executed. TheCPU 10 selectively takes in the provided data permitted to copy read by adrive unit 40 from adata recording medium 20, stores it in astorage unit 30, and enables processes, including editing and correction. - A
data recording medium 20 corresponds to aDVD 2. On the data recording medium, not only the provided data is compressed and recorded by theMPEG 2 scheme, but also the copy permission data (CGMS), as shown in FIG. 7, is recorded in part of the media file management data block so as to correspond to the provided data. - A
storage unit 30 corresponds to theexternal storage unit 3 of FIG. 1. The storage unit is used to store, edit, and correct the copied data. - A
drive unit 40 corresponds to theDVD drive 4 of FIG. 1. Thedrive unit 40 reads the data from thedata recording medium 20. Thedrive unit 40 comprisescipher generator units reading unit 46, encipheringunits unit 50. - The
cipher generator unit 41 generates an enciphering key (1) on the basis of a random value obtained from a random number generator. - The
register 42 holds the enciphering key (1) generated by thecipher generator unit 41. Theregister 43 holds the enciphering key (2) received from a reproducingunit 60 via the system bus 10A. - The
cipher generator unit 44 generates an enciphering key (3) using the enciphering key (1) and enciphering key (2). Theregister 45 holds the enciphering key (3) generated by thecipher generator unit 44. - The
reading unit 46 reads the data recorded on thedata recording medium 20. Here, the reading unit reads not only the provided data, such as movies or music, the object of copy control, but also the copy permission data (CGMS) as shown in FIG. 7, indicating the copy permission level of the provided data. - According to the copy permission data (CGMS), the enciphering
unit 47 enciphers the provided data read from thedata recording medium 20 using the enciphering key (3) stored in theregister 45 or the provided data enciphering key (5) stored in the register 51, or sends the provided data without enciphering it, to the reproducingunit 60 via the system bus 10A. - The
register 48 holds the copy permission data (CGMS) read from thedata recording medium 20. The encipheringunit 49 enciphers the copy permission data (CGMS) stored in theregister 48 and sends the enciphered data to the reproducingunit 60 via the system bus 10A. - The deciphering
unit 50 deciphers the enciphered provided data using the enciphering key (5), unique to the unit, received from the encipheringunit 70. The register 51 holds the enciphering key (5) deciphered by the decipheringunit 50. - A
unit 60 reproduces the provided data and corresponds to theMPEG board 6. The reproducingunit 60 includes an MPEG decoder and obtains the reproduced output data by decoding the provided data compressed by theMPEG 2 scheme received via the system bus 10A. Here, the reproducing unit comprisescipher generator units units MPEG 2decoder 68, and anenciphering unit 70. - The
cipher generator unit 61 generates an enciphering key (2) on the basis of a random value obtained from a random number generator. - The
register 62 holds the enciphering key (1) received fromdrive unit 40 via the system bus 10A. Theregister 63 holds the enciphering key (2) generated at thecipher generator unit 61. - The
cipher generator unit 64 generates an enciphering key (4) using the enciphering key (1) and enciphering key (2). Theregister 65 holds the enciphering key (4) generated by thecipher generator unit 64. - The deciphering
unit 66 decodes the enciphered copy permission data (CGMS) received from thedrive unit 40 via the system bus 10A in the computer body. - According to the copy permission data (CGMS) stored in the register71, the deciphering
unit 67 deciphers the provided data received from thedrive unit 40 via the system bus 10A in the computer body, using the enciphering key (4) stored in theregister 65 or the provided data deciphering key (6) stored in theregister 72, or sends the provided data without deciphering it, to theMPEG 2decoder 68. - The
MPEG 2decoder 68 decodes the provided data deciphered at the decipheringunit 67 and sends to thecontroller 80 the provided data that can be reproduced and outputted. - The
register 69 holds the provided data enciphering key (5) which is unique to the unit. The encipheringunit 70 enciphers the provided data enciphering key (5), unique to the unit, stored in theregister 69 and sends the enciphered data to thedrive unit 40. - The register71 holds the copy permission data (CGMS) deciphered at the deciphering
unit 66. - The
register 72 holds the provided data deciphering key (6) paired with the provided data enciphering key (5) (e.g., both the keys have values in common), unique to the unit, stored in theregister 69. - A
display controller 80 displays the provided data outputted from theMPEG 2decoder 68 on adisplay unit 81. - The key values in the
registers registers - FIGS.3 to 6 are flowcharts showing the processing sequence in the second embodiment of the present invention. FIGS. 3 and 4 are flowcharts showing the sequence of setting various types of key data for the enciphering and deciphering processes. FIGS. 5 and 6 are flowcharts showing the copy control processing sequence for reading the provided data.
- FIG. 7 illustrates a data format to help explain the copy permission data (CGMS) in the media file management data block recorded on the
data recording medium 20. Here, when bo, bl in the CGMS are “00,” all of the reproducingunits 60 are allowed to reproduce the copied data; when bo, bl are “01,” only the reproducing unit used in reading the provided data is allowed to reproduce the copied data exclusively; and when bo, bl is “11,” none of the reproducing units is allowed to reproduce the provided data. - Now, the operation of the second embodiment of the present invention will be described by reference to FIGS.2 to 7.
- First, the process of setting various types of key data for the enciphering and deciphering processes will be described by reference to the flowcharts shown in FIGS. 3 and 4.
- As a result of system start-up by a reproduction instruction, the
cipher generator unit 41 in thedrive unit 40 generates the enciphering key (1) on the basis of a random value (step 40 a in FIG. 3). - The enciphering key (1) generated by the
cipher generator unit 41 is not only stored in theregister 42 but also set in theregister 62 in the reproducingunit 60 under the control of the CPU 10 (step 10 a in FIG. 3 and step 60 a in FIG. 4). - The
cipher generator unit 61 in the reproducingunit 60 generates an enciphering key (2) on the basis of a random value (step 60 b in FIG. 4). - The enciphering key (2) generated at the
cipher generator unit 61 is not only stored in theregister 63 but also set in theregister 43 in thedrive unit 40 under the control of the CPU 10 (steps - The
cipher generator unit 44 in thedrive unit 40 generates an enciphering key (3) using the enciphering key (1) stored in theregister 42 and the enciphering key (2) stored in theregister 43 and then sets it in the register 45 (step 40 c in FIG. 3). - The
cipher generator unit 64 in the reproducingunit 60 generates an enciphering key (4) using the enciphering key (1) stored in theregister 62 and the enciphering key (2) stored in theregister 63 and then sets it in the register 65 (step 60 c in FIG. 4). - The
reading unit 46 in thedrive unit 40 reads the copy permission data (CGMS) from thedata recording medium 20 and sets it in the register 48 (step 40 d in FIG. 3). - The
enciphering unit 49 enciphers the copy permission data (CGMS) set in theregister 48, using the enciphering key (3) stored in the register 45 (step 40 e in FIG. 3). The enciphered copy permission data (CGMS) is given to the decipheringunit 66 in the reproducingunit 60 under the control of the CPU 10 (step 10 c in FIG. 3). - The deciphering
unit 66 deciphers the enciphered copy permission data (CGMS) received from thedrive unit 40, using the enciphering key (4) stored in theregister 65, and then sets it in the register 71 (step 60 d in FIG. 4). - The control unit (not shown) in the reproducing
unit 60 determines the contents of the copy permission data (CGMS) stored in the register 71. When determining that bO, bl in the copy permission data (CGMS) are “01” and therefore recognizing that only the reproducing unit used in reading the provided data is allowed to reproduce the copied data exclusively, the control unit starts up the enciphering unit 70 (step 60 e (Yes) in FIG. 4). - Then, the enciphering
unit 70 enciphers the provided data enciphering key (5) unique to the unit fixedly stored in theregister 69, using the enciphering key (4) stored in the register 65 (step 60 g in FIG. 4). - When bO, bl in the copy permission data (CGMS) are not “01,” dummy data (a null value) is generated in place of the provided data enciphering key (5) (
step 60 f in FIG. 4). - The
CPU 10 transfers the enciphered provided data enciphering key (5), unique to the unit, or the dummy data substituting for that key to the decipheringunit 50 in the drive unit 40 (step 10 d in FIG. 3). - The deciphering
unit 50 deciphers the enciphered provided data enciphering key (5), unique to the unit, received from the reproducingunit 60 and then sets the deciphered data in the register 51. - The above process completes the process of setting various types of key data for the enciphering and deciphering processes.
- Next, the copy control process in reading the provided data will be described by reference to the flowcharts in FIGS. 5 and 6.
- The
CPU 10 gives thedrive unit 40 an instruction to read the provided data (step S1 in FIG. 5). - Receiving a read instruction from the
CPU 10, the control unit (not shown) in thedrive unit 40 starts up thereading unit 46. Thereading unit 46 provides drive control of thedata recording medium 20 and reads the provided data (MPEG 2 data) and the copy permission data (CGMS) from the data recording medium 20 (step S2 in FIG. 5). - The copy permission data (CGMS) read from the
data recording medium 20 is stored in theregister 48 and then is supplied to the encipheringunit 47. - The
enciphering unit 47 determines the contents of the copy permission data (CGMS) stored in theregister 48. When determining that bO, bl in the CGMS are “00,” the enciphering unit outputs (passes) the provided data directly without enciphering the provided data. When they are “01,” the enciphering unit enciphers the provided data using the provided data enciphering key (5), unique to the unit, stored in the register 51. When they are “11,” the enciphering unit enciphers the provided data using the enciphering key (3) stored in the register 45 (steps S3 to S7 in FIG. 5). - The provided data (
MPEG 2 data) outputted from the encipheringunit 47 is transferred to the decipheringunit 67 in the reproducingunit 60 via the system bus 10A (step S8 in FIG. 5). - When receiving the provided data (
MPEG 2 data) from the encipheringunit 47 in thedrive unit 40, the decipheringunit 67 in the reproducingunit 60 determines the contents of the copy permission data (CGMS) stored in the register 71. When determining that bO, bl in the CGMS are “00,” the deciphering unit outputs (passes) the provided data directly without deciphering the provided data. When they are “01,” the deciphering unit deciphers the provided data using the provided data enciphering key (6), unique to the unit, stored in theregister 72. When they are “11,” the deciphering unit deciphers the provided data using the enciphering key (4) stored in the register 65 (steps S11 to S16 in FIG. 6). - The provided data (
MPEG 2 data) outputted from the decipheringunit 67 is decoded by theMPEG 2decoder 68. Then, the decoded data is sent to thedisplay controller 80 and is displayed on the display unit 81 (step S17 in FIG. 6). - In this case, when bO, bl in the copy permission data ( CGMS) are “00,” the
CPU 10 can reproduce and output the copied data arbitrarily, without specifying a reproducing unit, by loading the provided data (MPEG 2 data) into thestorage unit 30. - When bO, bl in the copy permission data (CGMS) are “01,” loading the provided data (
MPEG 2 data) into thestorage unit 30 enables only the reproducingunit 60 having the provided data enciphering key (6), unique to the unit, paired with the provided data enciphering key (5), unique to the unit, used in the enciphering process to reproduce the copied data. - In this case, when the copied data, together with the enciphering key (6) stored in the
register 72, is stored in thestorage unit 30, the corresponding copied data can be reproduced by reading the stored key data and resetting it in theregister 72, even if the key value in theregister 72 is rewritten in a later reproducing process. - When bO, bl in the copy permission data (CGMS) is “11,” the copied data cannot be deciphered because the value of the enciphering key (4) has already changed at the time of reproduction, even if the provided data (
MPEG 2 data) is loaded as the copied data into thestorage unit 30. As a result, none of the reproducing units can reproduce the copied data. - By setting new key values in the
registers registers - As described above, with the configuration that enables each item of the provided data (each title of the movies or music) to be enciphered and prevents a computer or the like from reading the data easily, highly reliable copy control of provided data most suitable for computer processing is established.
- Since only the data reproducing unit used in reading is allowed to reproduce a copy of the data read by a computer or the like, this enables authorized use of the copied data and prevents unauthorized use of the copied data.
- Hereinafter, a third embodiment of the present invention will be explained by reference to FIGS.8 to 10.
- First, a
CPU 10 sends a “START AUTHENTICATION” command to a drive unit 90 (step S41). In response to the “START AUTHENTICATION” command, the RANID generator unit in thedrive unit 90 causes a random generator to generate a random number and to send the generated random number as RANID to the CPU 10 (steps S21, S23). The RANID is an ID for identifying one MPEG board, when there are a plurality of MPEG boards acting as reproducing units, for example. TheCPU 10 acquires the RANID from thedrive unit 90 and sends it to the reproducingunit 120. The reproducingunit 120 causes aCHKEY 1generator unit 121 to encipher the RANID using algorithm A, generateCHKEY 1, hold it, and send it to the CPU 10 (steps S71, S73). TheCHKEY 1 is a key for identifying an MPEG board or a disk drive unit. TheCPU 10 acquires theCHKEY 1 from the reproducingunit 120 and transfers it to the drive unit 90 (step S45). Thedrive unit 90 causes anenciphering unit 95 to encipher theCHKEY 1 using algorithm B, generateKEY 1, hold it, and send it to the CPU 10 (steps S25, 27). TheCPU 10 acquires theKEY 1 from thedrive unit 90 and transfers it to the reproducingunit 120. The reproducingunit 120 causes a cipher generator unit 123 to encipher the heldCHKEY 1 using algorithm B, generateKEY 1, and compare it with theKEY 1 acquired from the CPU. If the comparison result shows that they coincide with each other, this means that the authentication of the drive unit by the reproducing unit has finished correctly. - Furthermore, the
drive unit 90 causes thecipher generator unit 99 to encipher the heldKEY 1 using algorithm C, generateKEY 2, hold it, and send it to the CPU (step, S29). TheCPU 10 acquires theCHKEY 2 from thedrive unit 90 and transfers it to the reproducingunit 120. If the comparison result at step S75 shows that they coincide with each other, the reproducingunit 120 causes thecipher generator unit 129 to encipher theCHKEY 2 sent from the CPU using algorithm D, generateKEY 2, hold theKEY 2, and send it to theCPU 10. TheCPU 10 acquires theKEY 2 from the reproducingunit 120 and transfers it to the drive unit (step S49). The drive unit causes thecipher generator unit 101 to encipher the heldKEY 2 using algorithm D and generateKEY 2 and causes acomparison circuit 105 to compare theKEY 2 with theKEY 2 acquired from the CPU (steps S29, S3 1). If the comparison result shows that they coincide with each other, this means that the drive unit has authenticated the reproducing unit properly. As a result, the mutual authentication between the drive unit and the reproducing unit has been completed. Then, the drive unit causes theenciphering unit 113 to encipher the DISK KEY (for identifying a disk) and the TITLE KEY (for identifying each of the titles) using theKEY 1,KEY 2, and algorithm E and send the enciphered data to the CPU (step S33). The CPU acquires the enciphered DISK KEY and TITLE KEY from the drive unit and sends it to the reproducing unit (step S5 1). The reproducing unit causes thedeciphering unit 137 to decipher the enciphered DISK KEY and TITLE KEY using theKEY 1,KEY 2, and algorithm E. Explanation of the copy permission data will not be given, because it is the same as in the second embodiment. - As described above, with the embodiment of the present invention, it is possible to construct a highly reliable system which allows a side having a medium to control use of copy arbitrarily on a provide data basis without showing the key data used in enciphering and deciphering to a computer unit, even in a system where the computer unit intervenes in the exchange of data supplied from a large capacity recording medium or the like, and which always enables use of the provided data through authorized copying.
- While in the embodiment, a large capacity disk, such as a DVD or a CD-ROM, requiring a drive unit has been taken as an example of a data providing medium, the present invention may be applied to a system configuration where a data providing medium is provided externally via, for example, a communication channel, in the same manner as in the above embodiment. This configuration can be implemented easily by providing an external data providing unit that communicates with the individual component parts of the
drive unit 40, except for the reading unit in FIG. 2, and by replacing the signal paths represented by broken lines in FIG. 2 with communication paths. - While in the embodiment, the copy permission data (CGMS) and the provided data enciphering key (5), unique to the unit, are enciphered and then transferred, they are not necessarily enciphered. They may not be enciphered, depending on the degree of reliability required.
- While in the second embodiment, the
drive unit 40 and reproducingunit 60 each generate the primary key data on the basis of random data, the present invention is not restricted this. For instance, at least either thedrive unit 40 or the reproducingunit 60 may generate the primary key data on the basis of random data, and on the basis of the primary key data, thedrive unit 40 and reproducingunit 60 each generate temporary secondary key data by themselves. The essential thing is that the drive unit and data reproducing unit have only to temporarily generate the mutually related key data using random data. - Furthermore, while in the embodiment, the provided data enciphering key (5), unique to the unit, and the provided data deciphering key (6), unique to the unit, are provided independently in the reproducing
unit 60 and are stored in theregisters unit 60 has only to grasp the enciphering scheme of the inputted provided data and the contents of the enciphering key in order to decipher the inputted provided data. - Still furthermore, while in the second embodiment, the copy control mechanism permits a first generation copy in such a manner that only the reproducing
unit 60 having the provided data enciphering key (6), unique to the unit, paired with the provided data enciphering key (5), unique to the unit, used in enciphering is allowed to reproduce the copy, and the copy control mechanism which prevents all of the reproducing units from reproducing the copy are used selectively, the present invention is not limited to this. For instance, the copy permission modes may be combined arbitrarily as follows: the copy permission mode of free copy and the copy permission mode that prevents all of the reproducing units from reproducing the copy may be combined; or the copy permission mode of free copy and the copy permission mode of first generation copy may be combined. - Still furthermore, while in the embodiments, the system in which a computer intervenes in the exchange of the data provided from a large capacity recording medium, communication medium, or the like has been used, the present invention is not restricted to this, but may be applied to a system configuration in which a computer does not intervene directly in the exchange of the provided data. For instance, the copy control mechanism may be applied to the interface section between units capable of reproducing the provided data, between a drive that reads the provided data from an MD, a CD-ROM, or a DVD, or a communication medium having the function of transmitting the provided data, and a unit that reproduces the read-out data.
- Still furthermore, while in the embodiments, the provided data, such as movies or music, compressed by the
MPEG 2 standard has been used, the present invention is not limited to this. For instance, the present invention may be applied to a system configuration capable of reproducing the data compressed by theMPEG 1 orMPEG 4 standard. - While in the embodiments, the provided data recorded on the recording medium was raw data, all of the provided data may be enciphered and recorded on a recording medium or only part of the provided data may be enciphered and recorded on a recording medium.
Claims (13)
1. A data copy control method applied to a computer system having a reproducing device which receives reproducing data read out by a drive device, said method comprising:
producing a shared key in each of the drive device and the reproducing device;
enciphering the reproducing data in the drive device using copy control data read out by the drive device and the shared key, and transferring the enciphered reproducing data and the copy control data to the reproducing device, the copy control data specifying a copy permission value; and
deciphering the enciphered reproducing data using the copy control data received by the drive device and the shared key.
2. The method according to claim 1 , wherein said producing comprises:
producing a first key based on a first random value in the drive device, and transferring the produced first key to the reproducing device;
producing a second key based on a second random value in the reproducing device, and transferring the produced second key to the drive device; and
producing the shared key in each of the drive device and the reproducing device using the first and second keys produced and transferred.
3. The method according to claim 2 , further comprising:
producing a third key in the reproducing device, the third key being allocated to the reproducing device;
enciphering the third key using the shared key in the reproducing device, and transferring the enciphered third key from the reproducing device to the drive device; and
deciphering the enciphered third key using the shared key in the drive device,
wherein said enciphering the reproducing data in the drive device uses the deciphered third key when the copy control data read out by the drive device designates the reproducing device as a specific reproducing device allowed to reproduce the reproducing data, and
wherein said deciphering the enciphered reproducing data uses the produced third key.
4. A data copy control apparatus for a computer system, said apparatus comprising:
a drive device to read reproducing data;
a reproducing device to reproduce the read reproducing data;
a shared key producing mechanism to produce a shared key in each of the drive device and the reproducing device;
an enciphering mechanism to encipher the reproducing data read out by the drive device using copy control data read out by the drive device and the shared key, the copy control data specifying a copy permission value;
a transferring mechanism to transfer the enciphered reproducing data and the copy control data to the reproducing device; and
a deciphering mechanism to decipher the enciphered data using the copy control data received by the reproducing device and the shared key.
5. The apparatus according to claim 4 , wherein said shared key producing mechanism comprises:
a first producing mechanism to produce a first key based on a first random value in the drive device;
a second producing mechanism to produce a second key based on a second random value in the reproducing device;
an exchanging mechanism to exchange the first and second keys between the drive device and the reproducing device; and
a third producing mechanism to produce the shared key in each of the drive device and the reproducing device using the first and second keys produced and exchanged.
6. The method according to claim 5 , further comprising:
a fourth producing mechanism to produce a third key in the reproducing device, the third key being allocated to the reproducing device;
a second enciphering mechanism to encipher the third key using the shared key in the reproducing device,
a second transferring mechanism to transfer the enciphered third key from the reproducing device to the drive device; and
a second deciphering mechanism to decipher the enciphered third key using the shared key in the drive device,
wherein said enciphering mechanism enciphers the reproducing data in the drive device using the deciphered third key when the copy control data read out by the drive device designates the reproducing device as a specific reproducing device allowed to reproduce the reproducing data, and
wherein said deciphering mechanism deciphers the enciphered reproducing data using the produced third key.
7. A data copy control method applied to a computer system having a reproducing device which receives reproducing data read out by a drive device, said method comprising:
producing a first key based on a first random value in the drive device;
producing a second key based on a second random value in the reproducing device;
exchanging the first and second keys between the drive device and the reproducing device;
producing a shared key in each of the drive device and the reproducing device using the first and second keys produced and exchanged;
producing, in either the drive device or the reproducing device, a third key for use with copy permission data to be transferred between the drive device and the reproducing device;
enciphering the third key using the shared key, and transferring the enciphered third key to either the drive device or the reproducing device; and
deciphering the enciphered third key using the shared key in one of the drive device and the reproducing device having received the enciphered third key.
8. A data copy control apparatus for a computer system having a reproducing device which receives reproducing data read out by a drive device, said apparatus comprising:
a first producing mechanism to produce a first key based on a first random value in the drive device;
a second producing mechanism to produce a second key based on a second random value in the reproducing device;
an exchanging mechanism to exchange the first and second keys between the drive device and the reproducing device;
a third producing mechanism to produce a shared key in each of the drive device and the reproducing device using the first and second keys produced and exchanged;
a fourth producing mechanism to produce, in either the drive device or the reproducing device, a third key for use with copy permission data to be transferred between the drive device and the reproducing device;
an enciphering mechanism to encipher the third key using the shared key;
a transferring mechanism to transfer the enciphered third key to either the drive device or the reproducing device; and
a deciphering mechanism to decipher the enciphered third key using the shared key in one of the drive device and the reproducing device having received the enciphered third key.
9. A data copy control method applied to a system having a reproducing device which receives data read out by a drive device, said method comprising:
producing at least one shared key in each of the drive device and the reproducing device;
enciphering copy control data read out by the drive device using one of the at least one shared key, and transferring the enciphered copy control data to the reproducing device, the copy control data specifying a copy permission value; and
deciphering the enciphered copy control data received by the reproducing device using the one of the at least one shared key.
10. The method according to claim 9 , wherein said producing comprises:
producing a first key based on a first random value in the drive device;
producing a second key based on a second random value in the reproducing device;
exchanging the first and second keys between the drive device and the reproducing device; and
producing the at least one shared key in each of the drive device and the reproducing device using the first and second keys produced and exchanged.
11. A data copy control apparatus for a system having a reproducing device which receives data read out by a drive device, said apparatus comprising:
a producing mechanism to produce at least one shared key in each of the drive device and the reproducing device;
an enciphering mechanism to encipher copy control data read out by the drive device using one of the at least one shared key, the copy control data specifying a copy permission value;
a transferring mechanism to transfer the enciphered copy control data to the reproducing device; and
a deciphering mechanism to decipher the enciphered copy control data received by the reproducing using the one of the at least one shared key.
12. The apparatus according to claim 11 , wherein said producing mechanism comprises:
a first producing mechanism to produce a first key based on a first random value in the drive device;
a second producing mechanism to produce a second key based on a second random value in the reproducing device;
an exchanging mechanism to exchange the first and second keys between the drive device and the reproducing device; and
a third producing mechanism to produce a first shared key in each of the drive device and the reproducing device using the first and second random keys produced and exchanged.
13. A data copy control method applied to a computer system having a reproducing device which receives reproducing data read out by a drive device, said method comprising:
producing identification data for the reproducing device in the drive device in response to receiving an authentication request;
executing first authentication between the drive device and the reproducing device, said executing first authentication comprising
producing a first challenge key based on the reproduced identification data in the reproducing device, and transferring the first challenge key to the drive device,
producing a first key based on the first challenge key in each of the drive device and the reproducing device, and
transferring the first key from the drive device to the reproducing device;
executing second authentication between the drive device and the reproducing device based on the produced identification data, said executing second authentication comprising
producing a second challenge key based on the produced first key in the drive device, and transferring the first challenge key to the reproducing device,
producing a second key based on the second challenge key in each of the drive device and the reproducing device, and
transferring the second key from the reproducing device to the drive device;
enciphering a disk key and a title key read out by the drive device using the first key and the second key, and transferring the enciphered disk key and title key to the reproducing device; and
deciphering the enciphered disk key and title key using the first key and the second key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/051,142 US6842521B2 (en) | 1996-01-08 | 2002-01-22 | Method and apparatus to control copying from a drive device to a data reproducing device |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP00098596A JP3176030B2 (en) | 1996-01-08 | 1996-01-08 | Copy control method and copy control device |
JP8-000985 | 1996-01-08 | ||
US08/817,903 US6347846B1 (en) | 1996-01-08 | 1996-12-11 | Method and an apparatus to control copying from a data providing device to a data receiving device |
US10/051,142 US6842521B2 (en) | 1996-01-08 | 2002-01-22 | Method and apparatus to control copying from a drive device to a data reproducing device |
Related Parent Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08817903 Continuation | 1996-12-11 | ||
PCT/JP1996/003608 Continuation WO1997025711A1 (en) | 1996-01-08 | 1996-12-11 | Method and apparatus for dubbing control |
US08/817,903 Continuation US6347846B1 (en) | 1996-01-08 | 1996-12-11 | Method and an apparatus to control copying from a data providing device to a data receiving device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020061105A1 true US20020061105A1 (en) | 2002-05-23 |
US6842521B2 US6842521B2 (en) | 2005-01-11 |
Family
ID=11488902
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/817,903 Expired - Fee Related US6347846B1 (en) | 1996-01-08 | 1996-12-11 | Method and an apparatus to control copying from a data providing device to a data receiving device |
US10/051,142 Expired - Lifetime US6842521B2 (en) | 1996-01-08 | 2002-01-22 | Method and apparatus to control copying from a drive device to a data reproducing device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/817,903 Expired - Fee Related US6347846B1 (en) | 1996-01-08 | 1996-12-11 | Method and an apparatus to control copying from a data providing device to a data receiving device |
Country Status (10)
Country | Link |
---|---|
US (2) | US6347846B1 (en) |
EP (1) | EP0814474B1 (en) |
JP (1) | JP3176030B2 (en) |
KR (1) | KR100311563B1 (en) |
CN (1) | CN1132373C (en) |
AU (1) | AU686058B2 (en) |
CA (1) | CA2199241C (en) |
DE (1) | DE69619654T2 (en) |
TW (1) | TW316301B (en) |
WO (1) | WO1997025711A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040255134A1 (en) * | 2002-02-27 | 2004-12-16 | Harutoshi Miyamoto | Host device |
US20060150233A1 (en) * | 2003-02-04 | 2006-07-06 | Medialive, A Corporation Of France | Protection method and device for the secure distribution of audio-visual works |
US20060242068A1 (en) * | 2004-12-21 | 2006-10-26 | Fabrice Jogand-Coulomb | Method forversatile content control |
US20070168292A1 (en) * | 2004-12-21 | 2007-07-19 | Fabrice Jogand-Coulomb | Memory system with versatile content control |
US20080010685A1 (en) * | 2006-07-07 | 2008-01-10 | Michael Holtzman | Content Control Method Using Versatile Control Structure |
US20080010455A1 (en) * | 2006-07-07 | 2008-01-10 | Michael Holtzman | Control Method Using Identity Objects |
US20100138652A1 (en) * | 2006-07-07 | 2010-06-03 | Rotem Sela | Content control method using certificate revocation lists |
US20100161928A1 (en) * | 2008-12-18 | 2010-06-24 | Rotem Sela | Managing access to an address range in a storage device |
US8311219B2 (en) | 1998-04-14 | 2012-11-13 | Hitachi, Ltd. | Reproducing apparatus, recording apparatus and display apparatus |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3176030B2 (en) * | 1996-01-08 | 2001-06-11 | 株式会社東芝 | Copy control method and copy control device |
JP2000503154A (en) * | 1996-01-11 | 2000-03-14 | エムアールジェイ インコーポレイテッド | System for controlling access and distribution of digital ownership |
TW346571B (en) * | 1996-02-06 | 1998-12-01 | Matsushita Electric Ind Co Ltd | Data reception apparatus, data transmission apparatus, information processing system, data reception method |
US6356704B1 (en) | 1997-06-16 | 2002-03-12 | Ati Technologies, Inc. | Method and apparatus for detecting protection of audio and video signals |
US6606450B1 (en) * | 1997-06-16 | 2003-08-12 | Ati International Srl | Method and apparatus for processing video signals having associated access restriction data |
ES2155230T3 (en) * | 1997-08-28 | 2001-05-01 | Sony Dadc Austria Ag | SYSTEM FOR MANAGING COPYING OF AN OPTICAL DISK. |
JPH11176091A (en) * | 1997-12-15 | 1999-07-02 | Hitachi Ltd | Digital information input output device, receiving device, recording device, and reproducing device |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
JP2995034B2 (en) * | 1998-04-30 | 1999-12-27 | 三洋電機株式会社 | Digital recording / playback system |
JP3835655B2 (en) * | 1998-06-09 | 2006-10-18 | ソニー株式会社 | Information signal reproducing apparatus, information signal processing apparatus, information signal reproducing method and information signal output method |
JP3819160B2 (en) | 1998-09-18 | 2006-09-06 | 富士通株式会社 | Information management method and information management apparatus |
US6976265B1 (en) * | 1998-10-08 | 2005-12-13 | Ati International Srl | Method and apparatus for controlling display of content signals |
JP4356178B2 (en) * | 1999-03-09 | 2009-11-04 | ソニー株式会社 | Playback device |
EP1045585A1 (en) * | 1999-04-13 | 2000-10-18 | CANAL+ Société Anonyme | Method of and apparatus for providing secure communication of digital data between devices |
US6690880B1 (en) * | 1999-05-21 | 2004-02-10 | Ati International, Srl | Method and apparatus for copy protection detection in a video signal |
JP4011792B2 (en) * | 1999-06-16 | 2007-11-21 | 株式会社東芝 | Recording method, reproducing method, recording apparatus, reproducing apparatus and recording medium |
JP4127587B2 (en) | 1999-07-09 | 2008-07-30 | 株式会社東芝 | Content management method, content management apparatus, and recording medium |
US7380137B2 (en) * | 1999-07-20 | 2008-05-27 | International Business Machines Corporation | Content guard system for copy protection of recordable media |
US7120251B1 (en) * | 1999-08-20 | 2006-10-10 | Matsushita Electric Industrial Co., Ltd. | Data player, digital contents player, playback system, data embedding apparatus, and embedded data detection apparatus |
EP2104100A3 (en) * | 1999-09-30 | 2012-02-22 | Panasonic Corporation | Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein |
WO2001031461A1 (en) * | 1999-10-25 | 2001-05-03 | Sony Corporation | Contents providing system |
CN1257508C (en) * | 1999-12-28 | 2006-05-24 | 松下电器产业株式会社 | Recording apparatus, reproducing apparatus, data processing apparatus, recording/reproducing apparatus, and data transmitting apparatus |
US7249105B1 (en) * | 2000-03-14 | 2007-07-24 | Microsoft Corporation | BORE-resistant digital goods configuration and distribution methods and arrangements |
JP2001307427A (en) * | 2000-04-26 | 2001-11-02 | Pioneer Electronic Corp | Device and method for information distribution and medium and device for information recording |
US20020003878A1 (en) * | 2000-04-28 | 2002-01-10 | Erlend Olson | Cryptographic key distribution system and method for digital video systems |
US20020037081A1 (en) * | 2000-04-28 | 2002-03-28 | David Rogoff | Cryptographic key distribution system and method for digital video systems |
JP4156188B2 (en) * | 2000-10-20 | 2008-09-24 | パイオニア株式会社 | Information output device, information output method, information recording device, information recording method, information output recording system, information output recording method, and information recording medium |
US6959090B1 (en) | 2000-11-20 | 2005-10-25 | Nokia Corporation | Content Protection scheme for a digital recording device |
KR100763144B1 (en) * | 2000-12-29 | 2007-10-08 | 주식회사 엘지이아이 | Air-conditioner driving by fuel cell |
US7058284B2 (en) * | 2001-03-29 | 2006-06-06 | Matsushita Electric Industrial Co., Ltd. | Universal multimedia optic disc player and its application for revocable copy protection |
DE60202568T8 (en) * | 2001-08-08 | 2005-10-20 | Matsushita Electric Industrial Co., Ltd., Kadoma | Copyright protection system, recording device, and playback device |
WO2003050997A1 (en) * | 2001-12-13 | 2003-06-19 | Sony Computer Entertainment Inc. | Methods and apparatus for secure distribution of program content |
JP4294488B2 (en) * | 2001-12-21 | 2009-07-15 | 株式会社ソニー・コンピュータエンタテインメント | Method and apparatus for secure program distribution |
JP3941513B2 (en) * | 2002-01-11 | 2007-07-04 | ソニー株式会社 | Recording method, recording apparatus, reproducing method, and reproducing apparatus |
DE602004029555D1 (en) * | 2003-01-15 | 2010-11-25 | Panasonic Corp | CONTAINER SYSTEM, END UNIT, TERMINAL METHOD AND STORAGE MEDIUM |
US7421742B2 (en) | 2003-01-15 | 2008-09-02 | Sony Corporation | Signal processing system, recording method, program, recording medium, reproduction device and information processing device |
US7835520B2 (en) * | 2003-02-20 | 2010-11-16 | Zoran Corporation | Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders |
US20060179305A1 (en) * | 2004-03-11 | 2006-08-10 | Junbiao Zhang | WLAN session management techniques with secure rekeying and logoff |
US7506377B2 (en) | 2003-06-11 | 2009-03-17 | Hewlett-Packard Development Company, L.P. | Method and apparatus for playing content |
JP4578366B2 (en) * | 2004-09-20 | 2010-11-10 | 株式会社ソニー・コンピュータエンタテインメント | Method and apparatus for distributing software applications |
WO2006078029A1 (en) * | 2005-01-24 | 2006-07-27 | Pioneer Corporation | Distribution device and method, reception device and method, distribution system, and computer program |
US8108928B2 (en) * | 2008-06-20 | 2012-01-31 | International Business Machines Corporation | Adaptive traitor tracing |
US8122501B2 (en) * | 2008-06-20 | 2012-02-21 | International Business Machines Corporation | Traitor detection for multilevel assignment |
US8422684B2 (en) * | 2008-08-15 | 2013-04-16 | International Business Machines Corporation | Security classes in a media key block |
JP4686584B2 (en) * | 2008-09-12 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | Digital information recording / reproducing apparatus and digital information recording / reproducing method |
JP4686583B2 (en) * | 2008-09-12 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | Digital information recording / reproducing apparatus and digital information recording / reproducing method |
US8571209B2 (en) | 2009-01-19 | 2013-10-29 | International Business Machines | Recording keys in a broadcast-encryption-based system |
JP4686632B2 (en) * | 2009-12-16 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | Digital information recording / reproducing apparatus and digital information recording / reproducing method |
JP4686641B2 (en) * | 2010-04-19 | 2011-05-25 | 日立コンシューマエレクトロニクス株式会社 | Digital broadcast receiving apparatus and digital broadcast receiving method |
WO2015145211A1 (en) * | 2014-03-27 | 2015-10-01 | Kam Fu Chan | Token key infrastructure and method for cloud services |
KR101565929B1 (en) * | 2015-05-06 | 2015-11-04 | 서대프랜트(주) | Double Chimney with Water Permeation Prevention function |
CN112487502A (en) * | 2020-12-15 | 2021-03-12 | 平安国际智慧城市科技股份有限公司 | Equipment authentication method and device, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5719937A (en) * | 1995-12-06 | 1998-02-17 | Solana Technology Develpment Corporation | Multi-media copy management system |
US5719938A (en) * | 1994-08-01 | 1998-02-17 | Lucent Technologies Inc. | Methods for providing secure access to shared information |
US6347846B1 (en) * | 1996-01-08 | 2002-02-19 | Kabushiki Kaisha Toshiba | Method and an apparatus to control copying from a data providing device to a data receiving device |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4644493A (en) | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
JP2804807B2 (en) * | 1989-12-15 | 1998-09-30 | 株式会社テック | Verification method of magnetic recording / reproducing system and merchandise sales management system using the verification method |
NZ237080A (en) * | 1990-03-07 | 1993-05-26 | Ericsson Telefon Ab L M | Continuous synchronisation for duplex encrypted digital cellular telephony |
US5081676A (en) | 1990-10-04 | 1992-01-14 | Chou Wayne W | Method and apparatus for protecting multiple copies of computer software from unauthorized use |
US5222137A (en) * | 1991-04-03 | 1993-06-22 | Motorola, Inc. | Dynamic encryption key selection for encrypted radio transmissions |
EP0545472B1 (en) * | 1991-12-02 | 1999-10-20 | Koninklijke Philips Electronics N.V. | Closed information system with physical copy protection |
JPH064026A (en) | 1992-06-17 | 1994-01-14 | Matsushita Electric Ind Co Ltd | Method for describing permission information and device for forming data with copying guard |
JP3010930B2 (en) * | 1992-09-24 | 2000-02-21 | 松下電器産業株式会社 | Recording and playback device |
JPH06124539A (en) | 1992-10-08 | 1994-05-06 | Sony Corp | Digital vtr |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
JPH06181044A (en) | 1992-12-15 | 1994-06-28 | Nikon Corp | Charged particle microscope |
US5337357A (en) | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5398285A (en) | 1993-12-30 | 1995-03-14 | Motorola, Inc. | Method for generating a password using public key cryptography |
JPH07221751A (en) | 1994-02-07 | 1995-08-18 | Nippon Telegr & Teleph Corp <Ntt> | Digital information copying method and its device |
JP2853727B2 (en) * | 1994-02-22 | 1999-02-03 | 日本ビクター株式会社 | Reproduction protection method and protection reproduction device |
FI95756C (en) * | 1994-03-21 | 1996-03-11 | Nokia Technology Gmbh | A method for encrypting and decrypting a bitstream containing digital information |
US5416842A (en) * | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls |
US5513260A (en) | 1994-06-29 | 1996-04-30 | Macrovision Corporation | Method and apparatus for copy protection for various recording media |
US5604800A (en) | 1995-02-13 | 1997-02-18 | Eta Technologies Corporation | Personal access management system |
US5615264A (en) | 1995-06-08 | 1997-03-25 | Wave Systems Corp. | Encrypted data package record for use in remote transaction metered data system |
US5784460A (en) | 1996-10-10 | 1998-07-21 | Protocall Technolgies, Inc. | Secured electronic information delivery system having a three-tier structure |
US5923754A (en) | 1997-05-02 | 1999-07-13 | Compaq Computer Corporation | Copy protection for recorded media |
-
1996
- 1996-01-08 JP JP00098596A patent/JP3176030B2/en not_active Expired - Fee Related
- 1996-12-11 DE DE69619654T patent/DE69619654T2/en not_active Expired - Fee Related
- 1996-12-11 AU AU11099/97A patent/AU686058B2/en not_active Ceased
- 1996-12-11 CN CN96190847A patent/CN1132373C/en not_active Expired - Fee Related
- 1996-12-11 KR KR1019970702109A patent/KR100311563B1/en not_active IP Right Cessation
- 1996-12-11 CA CA002199241A patent/CA2199241C/en not_active Expired - Fee Related
- 1996-12-11 WO PCT/JP1996/003608 patent/WO1997025711A1/en active IP Right Grant
- 1996-12-11 EP EP96941827A patent/EP0814474B1/en not_active Expired - Lifetime
- 1996-12-11 US US08/817,903 patent/US6347846B1/en not_active Expired - Fee Related
- 1996-12-30 TW TW085116288A patent/TW316301B/zh active
-
2002
- 2002-01-22 US US10/051,142 patent/US6842521B2/en not_active Expired - Lifetime
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5719938A (en) * | 1994-08-01 | 1998-02-17 | Lucent Technologies Inc. | Methods for providing secure access to shared information |
US5719937A (en) * | 1995-12-06 | 1998-02-17 | Solana Technology Develpment Corporation | Multi-media copy management system |
US6347846B1 (en) * | 1996-01-08 | 2002-02-19 | Kabushiki Kaisha Toshiba | Method and an apparatus to control copying from a data providing device to a data receiving device |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8311219B2 (en) | 1998-04-14 | 2012-11-13 | Hitachi, Ltd. | Reproducing apparatus, recording apparatus and display apparatus |
US20040255134A1 (en) * | 2002-02-27 | 2004-12-16 | Harutoshi Miyamoto | Host device |
US20060150233A1 (en) * | 2003-02-04 | 2006-07-06 | Medialive, A Corporation Of France | Protection method and device for the secure distribution of audio-visual works |
US8793722B2 (en) * | 2003-02-04 | 2014-07-29 | Nagra France | Protection method and device for the secure distribution of audio-visual works |
US20070168292A1 (en) * | 2004-12-21 | 2007-07-19 | Fabrice Jogand-Coulomb | Memory system with versatile content control |
US20100077214A1 (en) * | 2004-12-21 | 2010-03-25 | Fabrice Jogand-Coulomb | Host Device and Method for Protecting Data Stored in a Storage Device |
US8504849B2 (en) * | 2004-12-21 | 2013-08-06 | Sandisk Technologies Inc. | Method for versatile content control |
US20060242068A1 (en) * | 2004-12-21 | 2006-10-26 | Fabrice Jogand-Coulomb | Method forversatile content control |
US20080010455A1 (en) * | 2006-07-07 | 2008-01-10 | Michael Holtzman | Control Method Using Identity Objects |
US20100138652A1 (en) * | 2006-07-07 | 2010-06-03 | Rotem Sela | Content control method using certificate revocation lists |
US20080010685A1 (en) * | 2006-07-07 | 2008-01-10 | Michael Holtzman | Content Control Method Using Versatile Control Structure |
US8613103B2 (en) | 2006-07-07 | 2013-12-17 | Sandisk Technologies Inc. | Content control method using versatile control structure |
US8639939B2 (en) | 2006-07-07 | 2014-01-28 | Sandisk Technologies Inc. | Control method using identity objects |
US20100161928A1 (en) * | 2008-12-18 | 2010-06-24 | Rotem Sela | Managing access to an address range in a storage device |
US9104618B2 (en) | 2008-12-18 | 2015-08-11 | Sandisk Technologies Inc. | Managing access to an address range in a storage device |
Also Published As
Publication number | Publication date |
---|---|
EP0814474A1 (en) | 1997-12-29 |
AU686058B2 (en) | 1998-01-29 |
CA2199241C (en) | 2001-02-20 |
US6842521B2 (en) | 2005-01-11 |
TW316301B (en) | 1997-09-21 |
DE69619654T2 (en) | 2002-11-07 |
CN1132373C (en) | 2003-12-24 |
KR100311563B1 (en) | 2002-04-17 |
CN1176014A (en) | 1998-03-11 |
JPH09190667A (en) | 1997-07-22 |
US6347846B1 (en) | 2002-02-19 |
JP3176030B2 (en) | 2001-06-11 |
EP0814474A4 (en) | 2000-11-22 |
CA2199241A1 (en) | 1997-07-09 |
EP0814474B1 (en) | 2002-03-06 |
WO1997025711A1 (en) | 1997-07-17 |
AU1109997A (en) | 1997-08-01 |
DE69619654D1 (en) | 2002-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6842521B2 (en) | Method and apparatus to control copying from a drive device to a data reproducing device | |
EP0817185B1 (en) | Enciphering method, deciphering method, recording and reproducing method, deciphering device, deciphering unit device, recording medium, recording-medium manufacturing method, and key control method | |
US6289102B1 (en) | Apparatus and method for preventing unauthorized use of information recorded on an information recording medium | |
US6526146B1 (en) | Information recording system | |
CN100476977C (en) | Video/audio frequency information reading, recording, reproducing apparatus and method | |
JPH10108148A (en) | Method for protecting copyright of digital data and protection system | |
KR20050099934A (en) | Mutual authentication method, program, recording medium, signal processing system, reproduction device, and information processing device | |
US7937766B2 (en) | Method and system for preventing simultaneous use of contents in different formats derived from the same content at a plurality of places | |
JP2002132457A (en) | Information recording device, information reproducing device and information recording/reproducing device | |
EP1047062B1 (en) | Contents information recording method, contents information processing unit, contents information deciphering method, contents information deciphering unit and media thereof | |
US20090037748A1 (en) | Method and apparatus for forbidding use of digital content against copy control information | |
EP1054398A2 (en) | Contents information recording method and contents information recording unit | |
JP2004030882A (en) | Rendering device, copy control method, and program | |
US7035407B1 (en) | Data transmission system for prevention of unauthorized copy of data from recording medium | |
JP4123455B2 (en) | Information processing method and information processing apparatus | |
JP2002372910A (en) | Authenticating and reproducing method for contents information and contents information authenticating and reproducing device | |
US20050141011A1 (en) | Apparatus and method for recording data on and reproducing data from storage medium | |
JP4168358B2 (en) | Content information restoration method and content information restoration device | |
JP2000003559A (en) | Data reproducing method, data reproducing device, data coding method, data recording method, data recording device, authenticating method, and semiconductor chip | |
JPH064026A (en) | Method for describing permission information and device for forming data with copying guard | |
JP2003069948A (en) | Apparatus and system for image processing | |
JP3588593B2 (en) | Copy control method and copy control device | |
JP4379241B2 (en) | Recording / playback equipment | |
JP2003015960A (en) | File generation method and data processing method | |
JP2001166999A (en) | Method and device for recording and reading information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: KABUSHIKI KAISHA TOSHIBA, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NAKAMURA, SEIICHI;REEL/FRAME:012517/0635 Effective date: 19970221 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |